Automated provisioning of virtual machines

作者: David Maw , David S. Dodgson , James A. Fontana , Ralph Farina , Robert A. Johnson

DOI:

关键词:

摘要: Virtual machines in a network may be isolated by encrypting transmissions between the virtual with keys possessed only an intended recipient. Within network, logically organized into number of community-of-interest (COI) groups. Each COI use encryption key to secure communications within COI, such that other decrypt message. automatically provisioned configuration information, as keys, when machine is started. The provisioning information created based on template stored server.

参考文章(11)
Vikram Venkata Koka, Ann Shvarts, System and method for capacity licensing ,(2009)
Bradford Thomas Spiers, Richard A. Schimmel, Miroslav Halas, Donald P. Provencher, Secure Network Cloud Architecture ,(2012)
Oleg Barenboim, Joseph Fitzgerald, Compliance-based adaptations in managed virtual systems ,(2007)
Angelo Gaeta, Matteo Gaeta, Alan Smith, Ivan Djordjevic, Theo Dimitrakos, Maurizio Colombo, Sergio Miranda, Design patterns for secure virtual organization management architecture international workshop on security. pp. 207- 216 ,(2007) , 10.1109/SECCOM.2007.4550334
Daniel Nurmi, Rich Wolski, Chris Grzegorczyk, Graziano Obertelli, Sunil Soman, Lamia Youseff, Dmitrii Zagorodnov, The Eucalyptus Open-Source Cloud-Computing System cluster computing and the grid. pp. 124- 131 ,(2009) , 10.1109/CCGRID.2009.93
James W. Kelly, Robert M. Price, Robert G. Atkinson, Bryan W. Tuttle, Robert P. Reichel, Embedding certifications in executable files for network transmission ,(1996)
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, Dan Boneh, Terra: a virtual machine-based platform for trusted computing symposium on operating systems principles. ,vol. 37, pp. 193- 206 ,(2003) , 10.1145/1165389.945464
Patrick Goldsack, Antonio Lain, Distributed network connection policy management ,(2009)